Documente Academic
Documente Profesional
Documente Cultură
in/
Course Code BCS-011
Course Title: Computer Basics and PC Software
Assignment Number: BCA (R1)-011/Assignment/2018-19
Disclaimer/Special Note: These are just the sample of the Answers/Solutions to some of the Questions given in the Assignments.
These Sample Answers/Solutions are prepared by Private Teacher/Tutors/Authors for the help and guidance of the student to get
an idea of how he/she can answer the Questions given the Assignments. We do not claim 100% accuracy of these sample answers as
these are based on the knowledge and capability of Private Teacher/Tutor. Sample answers may be seen as the Guide/Help for the
reference to prepare the answers of the Questions given in the assignment. As these solutions and answers are prepared by the
private Teacher/Tutor so the chances of error or mistake cannot be denied. Any Omission or Error is highly regretted though every
care has been taken while preparing these Sample Answers/Solutions. Please consult your own Teacher/Tutor before you prepare a
Particular Answer and for up-to-date and exact information, data and solution. Student should must read and refer the official
study material provided by the university.
2
http://www.ignouassignmentwala.in/
system. It holds together many of the crucial components of a
computer, including the central processing unit (CPU), memory and
connectors for input and output devices. The base of a motherboard
consists of a very firm sheet of non-conductive material, typically some
sort of rigid plastic. Thin layers of copper or aluminum foil, referred to
as traces, are printed onto this sheet. These traces are very narrow and
form the circuits between the various components. In addition to
circuits, a motherboard contains a number of sockets and slots to
connect the other components.
b) What is an instruction in the context of a Microprocessor? How
does a microprocessor instruction specify data and operations?
Explain with the help of an example
Ans . The CPU is a semiconductorintegrated circuit chip consisting of a
large number of transistors. In personal computers, the CPu is also
referred by the term Microprocessor. Every CPU is capable of
performing certain instructions (known as machine instruction) Modern
CPUs have the logic built in to perform 400-550 machine instructions.
The machine instructions that e CPU can execute demonstrates its
capability, Every processor is capable of performing certain operations.
An instruction refers to an operation that can be performed by the
processor directy. The entire set of instructions that can bc executed by
the processor directly, through thฮ logic in hardware, form the
3
http://www.ignouassignmentwala.in/
instruction set of the processor, An instruction tells the processor what
task is to be performed and what micro operations need to be
completed to perform the task. Every instruction execution requires
execution of a set of arithmetic and logical operations
(micro-operations), The size and format of the i with different Every
instruction is comprised of two parts: oncode and operands. The opcode
the operation to be performed and the operaads provide the data on
which the opera is to be performed. To understand the concept of
instruction more clearly a simple hypothetical computer which the
capability to perform eight operations.
c) A computer system was designed to have a good latest processor
and I/O devices, however the designer of the computer did not put
any RAM in it. The computer does have a hard disk of 1 tera-byte.
Will this computer be able to execute programs? Explain giving
justification in support of your answer.
AnS. Computer Architecture: Input/Output Processor
An input-output processor (IOP) is a processor with direct memory
access capability. In this, the computer system is divided into a
memory unit and number of processors. Each IOP controls and manage
the input-output tasks. The IOP is similar to CPU except that it handles
only the details of I/O processing. The IOP can fetch and execute its
own instructions. These IOP instructions are designed to manage I/O
transfers only.
4
http://www.ignouassignmentwala.in/
The communication between the IOP and the devices is similar to the
program control method of transfer. And the communication with the
memory is similar to the direct memory access method. In large scale
computers, each processor is independent of other processors and any
processor can initiate the operation. The CPU can act as master and
the IOP act as slave processor. The CPU assigns the task of initiating
operations but it is the IOP, who executes the instructions, and not the
5
http://www.ignouassignmentwala.in/
7
http://www.ignouassignmentwala.in/
(iv) Hexadecimal ABCDEF to decimal and binary
ANS. Hexadecimal to decimal = ( 11259375)10
hexadecimal to binary= ( 101010111100110111101111)2
e) How are the tracks on magnetic disk different than that of
Optical disks? Consider one optical and one magnetic disks have
identical number of tracks and equal size sectors, will these two
disks have same size? Justify your answer.
AnS. The key differences between optical storage media, such as cds
and DVDs and magnetic storage media such as hard drives and old
fashion floppy disc is im how computer read and write information to
them.
Significance
computer are binary ,meaning that for them to understand
information . it has to be boiled down to a series of digits each of
which is a 1 or a 0 storage media a use different methods of
representing those digits.
8
http://www.ignouassignmentwala.in/
Storage
magnetic charge , the direction of that charge determines whether it
represents a 1 or 0 optical storage meanwhile uses disk made of
reflective material how each bit reflects light or does not reflect - IT
determines whether its a 1 or 0.
(f ) Compare and contrast the following technology .
(i) SRAM AND DRAM
Ans.
➡SRAM is an on-chip memory whose access time is small while DRAM
is an off-chip memory which has a large access time. Therefore SRAM is
faster than DRAM.
9
http://www.ignouassignmentwala.in/
➡DRAM is available in larger storage capacity while SRAM is of smaller
size.
➡SRAM is expensive whereas DRAM is cheap.
➡The cache memory is an application of SRAM. In contrast, DRAM is
used in main memory.
➡DRAM is highly dense. As against, SRAM is rarer.
➡The construction of SRAM is complex due to the usage of a large
number of transistors. On the contrary, DRAM is simple to design and
implement.
(ii) Usb and serial port
ANS.
10
http://www.ignouassignmentwala.in/
(iii) joystick and mouse
ANS.
A mouse is moved a mouse is moved back and forth and up and down
buy a person's hand. The mouse device moves across the table surface.
A joystick on the other hand stays stationary and is basically composed
of a base and a stick. A vertical stick which is held in the hand and
tilted forward backwards left and right. But the only thing that moves
with a joystick is the center stick
( iv) projection display and led display
ANs. An LED display is a flat panel display, which uses an array of
light-emitting diodes as pixels for a video display. Their brightness
allows them to be used outdoors where they are visible in the sun for
store signs and billboards, and in recent years they have also become
commonly used in destination signs on public transport vehicles, as
well as variable-message signs on highways. LED displays are capable
11
http://www.ignouassignmentwala.in/
from 100 to several hundred pages, depending on the nature of the
hard copy, before the ink cartridges must be replaced. There is usually
one black ink cartridge and one so-called color cartridge containing ink
in primary pigments (cyan, magenta, and yellow).
(ii) Power Connecter
ANs. Power connectors are devices that allows an electrical current to
pass through it for the exclusive purpose of providing power to a device
(not a data stream, for example, or anything more complex). Although it
can be used with many different types of electronics, customers must
find the specific type of connector that best matches their electronics’
geometry and electrical needs.
13
http://www.ignouassignmentwala.in/
(iii)Video Card
ANS.
Alternatively known as a display adapter, graphics card, video adapter,
video board, or video controller, a video card is an expansion card that
connects to a computer motherboard. It is used to creates a picture on
a display; without a video card, you would not be able to see this page.
More plainly, it is a piece of hardware inside of your computer that
deals with processing images and video, along with some of the tasks
that the CPU is normally responsible for. Video cards are used by
gamers in place of integrated graphics due to their extra processing
power and video ram.
(iv)Magnetic Stripe Reader
AnS. A magnetic stripe reader, also called a magstripe reader, is a
hardware device that reads the information encoded in the magnetic
stripe located on the back of a plastic badge. Magnetic stripe readers
can be read by a computer program through a serial port , USB
connection, or keyboard wedge , and are generally categorized by the
way they read a badge. For instance, insertion readers require that the
badge be inserted into the reader and then pulled out. Swipe readers
require that the badge pass completely through the reader.
Question 2: (Covers Block 2) (7×4=28 Marks)
14
http://www.ignouassignmentwala.in/
a) Explain the Internet Based Software Architecture with the help
of a block diagram. How is this architecture different than that of
3-tier client server architecture? Explain.
ANs. Software architecture refers to the high level structures of a
software system and the discipline of creating such structures and
systems. Each structure comprises software elements, relations among
them, and properties of both elements and relations.] The architecture
of a software system is a metaphor, analogous to the architecture of a
building. It functions as a blueprint for the system and the developing
project, laying out the tasks necessary to be executed by the design
teams. Software architecture is about making fundamental structural
choices which are costly to change once implemented. Software
architecture choices include specific structural options from
possibilities in the design of software. For example, the systems that
controlled the space shuttle launch vehicle had the requirement of
being very fast and very reliable. Therefore, an appropriate real-time
computing language would need to be chosen. Additionally, to satisfy
the need for reliability the choice could be made to have multiple
redundant and independently produced copies of the program, and to
run these copies on independent hardware while cross-checking
results.
15
http://www.ignouassignmentwala.in/
3 - tier architecture
development teams the ability to replace or upgrade independent tiers
without affecting the other parts of the system. For example, the user
interface of a web application could be redeveloped or modernized
without affecting the underlying functional business and data access
logic underneath. This architectural system is often ideal for embedding
and integrating 3rd party software into an existing application.
b) What is a file and directory in the context of a computer? What
are the activities involved in the file management? Explain how
file management is different than the Memory Management.
ANS. A file is a container in a computer system for storing
information. Files used in computers are similar in features to that of
paper documents used in library and office files. There are different
types of files such as text files, data files, directory files, binary and
graphic files, and these different types of files store different types of
information. In a computer operating system, files can be stored on
optical drives, hard drives or other types of storage devices.
•
A directory (folder) is a location for storing files on your computer.
Directories are found in a hierarchical file system, such as Linux,
MS-DOS, OS/2, and Unix.
•
Navigation
People working with files have to be able to go to the folder where the
17
http://www.ignouassignmentwala.in/
18
http://www.ignouassignmentwala.in/
Storage
While managing file storage generally, file management programs also
handle related tasks such as maintaining backups and reducing
duplication. They can perform these functions automatically or can
alert and remind users to carry out the functions manually.
Communications
File management programs usually include links to email or other
applications that allow the fast transfer of files into the communication
program. Typically the program carries out the transfer when the user
gives a command such as "Email" a file. The program sends a copy of
the file to the email program where the user can send it out.
Search
File management programs typically include a "Search" function. Such
a function will at least search the file names to find a particular file, but
some programs will also search the data or search for key words
attached to files. Users have to be able to configure the function to
carry out the kind of search they want because a file search may be
quick, but a search of all the data can take up to several hours.
•
Memory management
- Operating System manages Main Memory. Main memory provides a
fast storage that can be access directly by the CPU. A programs to be
executed, must in the main memory.
19
http://www.ignouassignmentwala.in/
- Keeps track of Main memory: Which part is used and not in used is
tracked by Operating System.
- Allocation and De-allocation of memory : Allocation of memory to
process when process requests it and De-allocation of memory when
the process no needs it.
- OS (operating system) decides which process will get memory when
and how much.
File Management
- Keep track of who gets the resources.
- Operating System keeps track of Status, location and uses of
Resources.
- Allocation of resources when requested and De-allocation of
resources.
(Rererences.https://www.tutorialspoint.com/operating_system/os_quic
k_guide.htm)
c) Explain the features and uses of the following in the context of
computer software and programming:
(i) Assembler
ANS.The assembler is the system program that translate source code
written in assembly language to object code( Machine Language) and
other information for.
(ii) Interpreter
ANS. Interpreter is a program that executes instructions written in a
20
http://www.ignouassignmentwala.in/
high-level language. There are two ways to run programs written in a
high-level language. The most common is to compile the program; the
other method is to pass the program through an interpreter. An
interpreter translates high-level instructions into an intermediate form,
which it then executes. In contrast, a compiler translates high-level
instructions directly into machine language.
(iii)Subroutine
ANs. A subroutine, also referred to as a function, procedure, and
subprogram, is a portion of code that may be called and executed
anywhere in a program. For example, a routine may be used to save a
file or display the time. Instead of writing the code each time these
commonly performed tasks are needed, routines are created and called
when these tasks need to be performed. Below is a basic example of a
Perl subroutine.
(iv)Function
ANS. function is a type of procedure or routine. Some programming
languages make a distinction between a function, which returns a
value, and a procedure, which performs some operation but does not
return a value. Most programming languages come with a prewritten
set of functions that are kept in a library. You can also write your own
functions to perform specialized tasks.
d) Differentiate between the following:
(i) Kernel of an Operating system and Non-resident portion of
21
http://www.ignouassignmentwala.in/
Operating system
ANS.The kernel is a computer program that is the core of a computer's
operating system, with complete control over everything in the
system.[1] On most systems, it is one of the first programs loaded on
start-up (after the bootloader). It handles the rest of start-up as well as
input/output requests from software, translating them into
data-processing instructions for the central processing unit. It handles
memory and peripherals like keyboards, monitors, printers, and
speakers. The critical code of the kernel is usually loaded into a
separate area of memory, which is protected from access by application
programs or other, less critical parts of the operating system. The
kernel performs its tasks, such as running processes, managing
hardware devices such as the hard disk, and handling interrupts, in
this protected kernel space. In contrast, everything a user does is in
user space: writing text in a text editor, running programs in a GUI, etc.
(ii) Command line interface and Graphical user interface of
Operating system
ANS.
GUI AND CLI
Ease:
If we talk about ease of use, the new users will pick up a GUI much
faster than a CLI. In a CLI, new users have some difficulty operating it
because they are not familiar with the commands
22
http://www.ignouassignmentwala.in/
Control:
With a GUI, there’s control over files and the operating system – but
advanced tasks may still need to use the command line.
With a CLI, users have all the control over file system and operating
system, and the tasks become simple. For example, you can copy a file
or several with one command.
Speed:
If we talk about speed, in a GUI, using the mouse and the keyboard to
control the file system or the operating system is going to be slower
than using the command line.
In a CLI, the users only need to utilize the keyboard and may need to
execute only few commands to complete the task.
Hacking:
If we talk about hacking, all the vulnerability exploits are done from
command line. All the remote access and file manipulation are done
from the command line.
Scripting:
One thing I love about command line is that you can create a script
that contains few lines of command and it will do the work for you.
Although GUI’s can create shortcuts, tasks or other similar actions,
they don’t come close to what command line can do.
(iii)Multiprogramming and Multitasking
ANS. Multiprogramming
23
http://www.ignouassignmentwala.in/
24
http://www.ignouassignmentwala.in/
operating system is not a whole application program but it can also
refer to a “thread of execution” when one process is divided into
sub-tasks.
(iv) Computer Virus and Computer Worms
ANs. Viruses are typically attached to an executable file or a word
document. They often spread via P2P file sharing, infected websites,
and email attachment downloads. Worms, on the other hand, don't
need a host program in order for them to run, self-replicate and
propagate. Once a worm has made its way onto your system, usually
via a network connection or as a downloaded file, it can then make
multiple copies of itself and spread via the network or internet
connection infecting any inadequately-protectedcomputers
and servers
on the network.
25
http://www.ignouassignmentwala.in/
e) Draw a flow chart and write an algorithm for a program that
multiplies all two digit odd numbers. (You must use looping).
ANS.
26
http://www.ignouassignmentwala.in/
e) Draw a flow chart and write an algorithm for a program that
multiplies all two digit odd numbers. (You must use looping).
ANS
27
http://www.ignouassignmentwala.in/
iii) Optical Fiber
Optical fiber is made by drawing glass or plastic to a desired length and
diameter (slightly larger than a human hair). This flexible and highly
pure fiber is most commonly used to transmit light for a wide range of
applications including visible light displays, sensors, and high-speed
communications networks . Optical fibers and cables have proven to be
more reliable than their metal wire counterparts, partially due to the
lower rate of loss or interruption of data, but largely in part to their
immunity to electromagnetic interference. In addition, optical fiber
allows for transmission of data over greater distances with higher
bandwidths than earlier wire cable.
29
http://www.ignouassignmentwala.in/
iv) Radio wave transmission.
ANS. Radio waves, also called radio waves as they were discovered by
German physicist Heinrich Hertz in 1888, are electromagnetic waves,
that is to say the combined oscillation of an electric field and a
magnetic field. Radio waves, infrared, visible light, ultraviolet, X-rays or
gamma rays are all examples of electromagnetic waves.
30
http://www.ignouassignmentwala.in/
It is a technique where data is transmitted using radio waves and
therefore energy travels through the air rather than copper or glass.
Conceptually, radio, TV, cellular phones etc. uses radio transmission in
one form or another. The radio waves can travel through walls and
through an entire building. Depending upon the frequency, they can
travel long distance or short distance. Satellite relay is the one example
of long distance communication
(b) A new company which supplies food packets in a locality has to
set up a network in its sales office employing 10 parallel ordering
stations. It has a large number of person who supplies the food
packet at the destination (maximum distance 2 kms from the
office). What kind of network the company should make for its
sales office? Justify your answer.
ANS. A new company will have to create LOCAL AREA NETWORK .
LAN are private network, not subject to tariff or other regulatory
controls for the wireless lan there are additional regulations in several
countries. LAN operate at relatively high speed when compared to the
typical WAN ( 2 to 100mb per second ).
there are different types of media access control method in a lan the
prominent ones are bus based ethernet , token , ring etc .
(d) Why is a networking software has layers? List and define the
role of each layer of ISO-OSI model.
31
http://www.ignouassignmentwala.in/
ANS.
32
http://www.ignouassignmentwala.in/
The International Standards Organization (ISO) developed the Open
Systems Interconnection (OSI) model. It divides network
communication into seven layers.
The 7 Layers of the OSI
In the OSI model, control is passed from one layer to the next, starting
at the application layer (Layer 7) in one station, and proceeding to the
bottom layer, over the channel to the next station and back up the
hierarchy. The OSI model takes the task of inter-networkingand divides
that up into what is referred to as a vertical stack that consists of the
following 7 layers.
Application (Layer 7)
OSI Model, Layer 7, supports application and end-user processes.
Communication partners are identified, quality of service is identified,
user authentication and privacy are considered, and any constraints on
data syntax are identified. Everything at this layer is
application-specific. This layer provides application services for file
transfers, e-mail, and other network software services. Telnet and FTP
are applications that exist entirely in the application level. Tiered
application architectures are part of this layer.
Presentation (Layer 6)
This layer provides independence from differences in data
representation (e.g., encryption) by translating from application to
33
http://www.ignouassignmentwala.in/
network format, and vice versa. The presentation layer works to
transform data into the form that the application layer can accept. This
layer formats and encrypts data to be sent across a network, providing
freedom from compatibility problems. It is sometimes called the syntax
layer.
Session (Layer 5)
This layer establishes, manages and terminates connections between
applications. The session layer sets up, coordinates, and terminates
conversations, exchanges, and dialogues between the applications at
each end. It deals with session and connection coordination.
Transport (Layer 4)
OSI Model, Layer 4, provides transparent transfer of data between end
systems, or hosts, and is responsible for end-to-end error recovery and
flow control. It ensures complete data transfer.
Network (Layer 3)
Layer 3 provides switching and routing technologies, creating logical
paths, known as virtual circuits, for transmitting data from node to
node. Routing and forwarding are functions of this layer, as well as
addressing, internetworking, error handling, congestion control and
packet sequencing.
Data Link (Layer 2)
At OSI Model, Layer 2, data packets are encoded and decoded into bits.
It furnishes transmission protocol knowledge and management and
34
http://www.ignouassignmentwala.in/
handles errors in the physical layer, flow control and frame
synchronization. The data link layer is divided into two sub layers: The
Media Access Control (MAC) layer and the Logical Link Control (LLC)
layer.
Physical (Layer 1)
OSI Model, Layer 1 conveys the bit stream - electrical impulse, light or
radio signal — through the network at the electrical and mechanical
level. It provides the hardware means of sending and receiving data on
a carrier, including defining cables, cards and physical aspects. Fast
Ethernet, RS232, and ATM are protocols with physical layer
components.
(f) Explain the following in the context of Internet and its
applications:
(i) Security threats on Internet
ANS. Image Spam
Image-based spam has increased in the past year, and a higher
percentage is making it past spam filters. The reason this happens is
the images are varied each time a message is sent out. spam images are
just slightly changed each time the message is sent. The difference may
be a change in the border, or the variance of one pixel, but the change
is enough to get past traditional content and signature-scanning filters.
Phishing
You receive an email that is made to look as though it comes from a
35
http://www.ignouassignmentwala.in/
legitimate company you normally do business with. The email, for
example, might tell you that some sort of service normally provided to
you is due to expire soon.
Email Spoofing
Email Spoofing is when an email message appears to have originated
from one source when it actually was sent from another source. Email
spoofing is often an attempt to trick the user into making a damaging
statement or releasing sensitive information (such as passwords).
Spoofed email can range from harmless pranks to social engineering
ploys.
Email-Borne Viruses
Viruses and other types of malicious code are often spread as
attachments to email messages. Before opening any attachments, be
sure you know the source of the attachment.
Chat Clients
Internet chat applications, such as instant messaging applications and
Internet Relay Chat (IRC) networks, provide a mechanism for
information to be transmitted bi-directionally between computers on
the Internet. Chat clients provide groups of individuals with the means
to exchange dialog, web URLs, and in many cases, files of any type.
Because many chat clients allow for the exchange of executable code,
they present risks similar to those of email clients.
Overseas Money Transfer Scam
36
http://www.ignouassignmentwala.in/
If an email sounds too good to be true, then it is. You'll receive an email
from someone claiming to represent a foreign government or someone
formerly involved with a foreign government.
(ii) E-learning processes
Since, any e-learning project checks your achievements against a
learning outcome, therefore, it starts with identification and verification
process. The common process used for this purpose is the use of
Username and Password. You are asked to login to the e-learning
system before you start using it.Once you are successfully logged in to
the system. The e-leaning topics or contents are presented to you topic
by topic. This content may include text, graphics, video, audio,
animation, link to other references. In general, such content may be
followed by some quiz or questions that try to access your
understanding about the topic that you have studies. The e-learning
systems may be a Learning Management System (LMS) or Content
Management System (CMS) running as the base system.
37
http://www.ignouassignmentwala.in/
(
references- h ttp://egyankosh.ac.in/handle/123456789/10970)
38
http://www.ignouassignmentwala.in/
39